chapter five
5 Securing Spring Boot applications
This chapter covers
- Overview of Spring Security, Common Security threats
- Enabling Spring Security in a Spring Boot application and understanding Spring Security Auto-configuration
- Customizing Spring Security with in-memory, JDBC, and LDAP authentication
- Implementing HTTP basic authentication in a Spring Boot project
In the past chapters, you’ve learned several essential techniques to build Spring Boot applications. You are now well-versed with core Spring Boot concepts, understood several techniques to communicate to the database, can monitor Spring Boot applications with Spring Boot Actuator, and in a position to start building enterprise-grade Spring Boot applications. However, before you are super excited and announce to the world your newly acquired skills, there is another essential technique that you need to master on. What about the security of our Spring Boot applications? In this chapter, you’ll explore several techniques to secure Spring Boot applications with Spring Security.